Blog
Ethical Hacking?
When we usually think of hacking, we think of someone sitting in a dark room with a hoodie on, furiously typing away as...
MOREnet Cybersecurity Challenge in National REN Publication
The Quilt is a national coalition of nonprofit regional research and Education Networks (RENs) representing 43 networks across the U.S. As a member of the...
Social Media Spotlight - Chat Rooms
Chat rooms and messaging apps have grown and matured in a way that allows them to stand on their own as another social...
Offsite DNS for Disaster Recovery
Having an offsite DNS server can keep your internet services accessible during outages. As part of your disaster recovery plan, MOREnet can provide offsite DNS for your organization.
World Password Day-May the 4th Be With You
How secure is your password? Is it long and strong? Is it unique for each site or app you log into? Well, if...
Safe and Secure Disposal of Electronic Devices
Replacing a computer, tablet or network equipment comes with its own set of challenges. Secure configuration before connecting to the network and/or Internet...
Your Digital Life
We are a digital society. We live our lives on the Internet; shopping, banking, researching and corresponding. Most people use social media for...
Tax Scams
It's that time of year-Tax Season. This is a time to be extra vigilant to protect your identity and money. Here are a...
Pumping the Brakes on AI
Artificial Intelligence (AI) news has been exploding in the last couple of weeks. Technology leaders are weighing in with their opinions and recommendations...
Artificial Intelligence (AI) in the Future of Cybersecurity
Artificial Intelligence has been making headlines with the emergence of ChatGPT, a conversational chatbot created by OpenAI. This model was trained to use...
Data Privacy
As more components of our daily lives move online, schools and institutions are more reliant upon data, technology and online tools and resources to support...
Student Privacy
- Privacy Laws and Awareness
- The Educator’s Guide to Student Data Privacy – Future of Privacy Forum
- Vetting Software
- Evaluating...
Privacy Best Practices
When developing a data privacy program, there are a variety of steps that will make setting this up run...
Blocksi
Blocksi, a Google for Education partner, is dedicated to providing an innovative and powerful all-in-one cloud-based multi-OS content filtering and classroom screen monitoring...
Student Data Privacy
What are you doing to protect your students' data? Do you know what type of information is being collected and used by the...
Effects of Blocking GNN Ports
Blocking these ports may affect:
- Access to Microsoft Exchange servers over the Internet using MS Outlook (blocking these ports will not affect using MS Outlook...
Akamai Secure Internet Access
Join us for a conversation with Connie Coy, Cybersecurity Analyst with MOREnet, as we discuss an excellent tool for network security and content filtering.
Break the Chain
Remember the chain letter? You know, the message you sent to 20 friends, urging them to send to 20 of their friends? You may need...
What is a Supply Chain Attack?
Supply chain attacks occur when a miscreant targets a trusted third-party vendor who is offering services or software to an organization. An unsecure supplier in...
Don't Blame the Human
Humans are often thought of as the weakest link in the cybersecurity chain. End-user training and education is crucial to help condition users to recognize...